Abstract We propose a way to abstract from various specifications of authentication and to obtain idealized protocols "secure by construction". This feature enables us to prove that a cryptographic protocol is the correct implementation of the corresponding abstract protocol. Our proposal relies on the combination of two authentication primitives, proposed by the authors in [20, 18] to a simplified version of the spi calculus
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
In this paper, we describe a simple logic. The logic uses the notion of channels that are generalisa...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...
We propose a way to abstract from various specifications of authentication and to obtain idealized pr...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
We use two authentication primitives proposed recently as a linguistic support for enforcing authent...
We use two authentication primitives proposed recently as a linguistic support for enforcing auth...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
We extend the pi-calculus and the spi-calculus with two primitives that guarantee authentication. Th...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
In this paper, we describe a simple logic. The logic uses the notion of channels that are generalisa...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...
We propose a way to abstract from various specifications of authentication and to obtain idealized pr...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
We use two authentication primitives proposed recently as a linguistic support for enforcing authent...
We use two authentication primitives proposed recently as a linguistic support for enforcing auth...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...
AbstractWe introduce the spi calculus, an extension of the pi calculus designed for describing and a...
We extend the pi-calculus and the spi-calculus with two primitives that guarantee authentication. Th...
We present a new technique for verifying authenticity in cryptographic protocols. This technique is ...
In this paper, we describe a simple logic. The logic uses the notion of channels that are generalisa...
This paper presents a novel approach for concisely abstracting authentication protocols and for subs...